Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
splunk splunk vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2023-32711
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.
Splunk Splunk
3.1
CVSSv3
CVE-2023-32712
In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code e...
Splunk Splunk
8.8
CVSSv3
CVE-2010-3322
The XML parser in Splunk 4.0.0 up to and including 4.1.4 allows remote authenticated users to obtain sensitive information and gain privileges via an XML External Entity (XXE) attack to unknown vectors.
Splunk Splunk
6.1
CVSSv3
CVE-2022-27183
The Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions prior to 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on ...
Splunk Splunk
5.4
CVSSv3
CVE-2019-5727
Splunk Web in Splunk Enterprise 6.5.x prior to 6.5.5, 6.4.x prior to 6.4.9, 6.3.x prior to 6.3.12, 6.2.x prior to 6.2.14, 6.1.x prior to 6.1.14, and 6.0.x prior to 6.0.15 and Splunk Light prior to 6.6.0 has Persistent XSS, aka SPL-138827.
Splunk Splunk
7.5
CVSSv3
CVE-2021-3422
The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions prior to 7.3.9, 8.0 versions prior to 8...
Splunk Splunk
7.5
CVSSv3
CVE-2018-7429
Splunkd in Splunk Enterprise 6.2.x prior to 6.2.14 6.3.x prior to 6.3.11, and 6.4.x prior to 6.4.8; and Splunk Light prior to 6.5.0 allow remote malicious users to cause a denial of service via a malformed HTTP request.
Splunk Splunk
6.5
CVSSv3
CVE-2018-7431
Directory traversal vulnerability in the Splunk Django App in Splunk Enterprise 6.0.x prior to 6.0.14, 6.1.x prior to 6.1.13, 6.2.x prior to 6.2.14, 6.3.x prior to 6.3.10, 6.4.x prior to 6.4.6, and 6.5.x prior to 6.5.3; and Splunk Light prior to 6.6.0 allows remote authenticated ...
Splunk Splunk
7.5
CVSSv3
CVE-2018-7432
Splunk Enterprise 6.2.x prior to 6.2.14, 6.3.x prior to 6.3.10, 6.4.x prior to 6.4.7, and 6.5.x prior to 6.5.3; and Splunk Light prior to 6.6.0 allow remote malicious users to cause a denial of service via a crafted HTTP request.
Splunk Splunk
7
CVSSv3
CVE-2017-18348
Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPL...
Splunk Splunk
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »